CN106549858A - A kind of instant messaging encryption method based on id password - Google Patents

A kind of instant messaging encryption method based on id password Download PDF

Info

Publication number
CN106549858A
CN106549858A CN201611123159.8A CN201611123159A CN106549858A CN 106549858 A CN106549858 A CN 106549858A CN 201611123159 A CN201611123159 A CN 201611123159A CN 106549858 A CN106549858 A CN 106549858A
Authority
CN
China
Prior art keywords
instant
instant communication
communication users
group
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611123159.8A
Other languages
Chinese (zh)
Other versions
CN106549858B (en
Inventor
程朝辉
周枭淳
劳阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ao Lian Information Security Technology Co Ltd
Original Assignee
Shenzhen Ao Lian Information Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ao Lian Information Security Technology Co Ltd filed Critical Shenzhen Ao Lian Information Security Technology Co Ltd
Priority to CN201611123159.8A priority Critical patent/CN106549858B/en
Priority to CN201910342724.7A priority patent/CN110071863A/en
Publication of CN106549858A publication Critical patent/CN106549858A/en
Application granted granted Critical
Publication of CN106549858B publication Critical patent/CN106549858B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of instant messaging encryption method based on id password; instant communication users download the corresponding private key of mark from the key generation system of id password system; instant communication users A with identity ID_a realizes security instant communication with the instant communication users B with identity ID_b; both sides are formed in communication process and both knows about the symmetric encipherment algorithm and message consistency protection algorithm that other ignorant master key K use selection, the content of session is encrypted and data consistency protection.The invention has the beneficial effects as follows; when instant communication users A and instant communication users B online communications, both sides have carried out strong identity authentication; do not possess the corresponding private keys of ID_a or ID_b and cannot effectively calculate communications protection key K; so as to be decrypted to the data encrypted, or forge or distort the message by data consistency protection.In offline communications or group communication, no corresponding identity private key cannot decrypt offline or group communication data.

Description

A kind of instant messaging encryption method based on id password
Technical field
The present invention relates to the field of the data safety in data communication, more particularly to protects instant messaging using cryptographic technique A kind of instant messaging encryption method based on id password of the safety of data.
Background technology
JICQ such as QQ, wechat etc. carry out information transmission using IP Digital Network technologies, considerably reduce logical The expense of letter.Because of the opening of IP network, this kind of instant messaging faces leaking data, or the risk being tampered, and needs to adopt Cryptographic technique is protected.
Traditional method, such as QQ, Skype and wechat etc., in traditional IM (Instant Message) system-based, plus Enter client to the encrypted tunnel of server.But this still suffers from following 3 problems:The independent authentication problem of message, identity it is true Reality is ensured that by server user is unable to sender's identity of individual authentication message;End end secure communication problem, the service of message Jing Turn re-encrypted when in device, therefore content does not maintain secrecy to service provider, i.e., be not end end safety.Forward secrecy communication issue, The session key of QQ and Skype is permanent key, once revealing, will jeopardize all Content of Communication, that is, lack forward secrecy.
The content of the invention
The purpose of the present invention is to carry out letter using IP Digital Network technologies for current JICQ such as QQ, wechat etc. Breath transmission, considerably reduces the expense of communication.Because of the opening of IP network, this kind of instant messaging faces leaking data, or The risk being tampered provides a kind of instant messaging encryption method based on id password.
The present invention is to realize that the technical scheme adopted by its purpose is:A kind of instant messaging encryption side based on id password Method, instant communication users download the corresponding private key of mark from the key generation system of id password system, with identity ID_ The instant communication users A of a realizes security instant communication, including following step with the instant communication users B with identity ID_b Suddenly;
Whether step A, instant communication users A detection instant communication users B are online, if turning to step B online, otherwise turning To step C;
Step B01, instant communication users A initiate communication process using the identity of instant communication users B;In IMU The terminal of credit household A generates random X, according to parameter G that system is selected, calculates R_a=GX;Being calculated using hash function H is included The summary HASH_a of the first information of R_a, ID_a, ID_b;
Open systematic parameter PP_ of the id password system that step B02, instant communication users A inquiry ID_b marks are located b;Mark AES encryption R_a and HASH_a is performed using PP_b and ID_b;By the second information data including encrypted result It is sent to instant communication users B;
After step B03, instant communication users B receive the second information data of instant communication users A transmissions, using ID_b pair The private key decrypted message answered obtains R_a, HASH_a;
Step B04, instant communication users B verify the legitimacy of HASH_a;If illegal, terminate this communication, it is no Random number Y is then generated, according to parameter G that system is selected, R_b=G is calculatedY, K is calculated using R_a and R_b;Using hash function H Calculating includes R_a, the summary HASH_b of the 3rd information of R_b, ID_a, ID_b, K;
Open systematic parameter PP_ of the id password system that step B05, instant communication users B inquiry ID_a marks are located a;Mark AES encryption R_b and HASH_b is performed using PP_a and ID_a;By the 4th information data including encrypted result It is sent to instant communication users A;
After step B06, instant communication users A receive the 4th information data of instant communication users B transmissions;Using ID_a pair The private key decrypted message answered obtains R_b, HASH_b;The legitimacy of verification HASH_b;If illegal, terminate this communication; R_a and R_b is otherwise utilized to calculate K;
Step B07, K is used when conversating as master key in instant communication users A and instant communication users B, used The symmetric encipherment algorithm and message consistency protection algorithm of selection, is encrypted to the content of session and data consistency protection; Instant communication users A and instant communication users B realize secured session, and session finishes end;
Open systematic parameter PP_b of the id password system that step C, instant communication users A inquiry ID_b marks are located; Mark AES encryption instant message data are performed using PP_b and ID_b..
The invention has the beneficial effects as follows, when instant communication users A and instant communication users B online communications, both sides have been carried out by force Authentication, i.e., do not possess the corresponding private keys of ID_a or ID_b and cannot effectively calculate communications protection key K, so as to cannot to encryption Data be decrypted, or forge or distort by data consistency protect message.In offline communications or group communication, Offline or group communication data cannot be decrypted without corresponding identity private key.
Further, in the above-mentioned instant messaging encryption method based on id password:Utilize in described step B04 It is K=(G that R_a and R_b calculates the formula of KX)Y=GXY;In described step B06, utilize the formula that R_a and R_b calculates K to be K =(GY)X=GXY
Further, in the above-mentioned instant messaging encryption method based on id password:In described step B04 and step The formula that R_a and R_b calculates K is utilized to be K=R_a R_b in B06.
Further, in the above-mentioned instant messaging encryption method based on id password:Second information also includes ID_a, Mark ID_kgc_a/ID_kgc_b of the id password system that ID_b, ID_a/ID_b are located.4th information also includes ID_a, Mark ID_kgc_a/ID_kgc_b of the id password system that ID_b, ID_a/ID_b are located.In addition, the described first information, Also include current time T in second information, the 3rd information, the 4th information.
Further, in the above-mentioned instant messaging encryption method based on id password:The content bag of session in step B07 Include word, voice, file.
The present invention also provides a kind of IMU customer group carries out secured fashion, and technical scheme is:It is a kind of to be based on id password Instant messaging encryption method, by one group of instant communication users [Xi] the instant communication users group that constitutes, i is natural number, group into Member XiThere is identity ID_x respectivelyi, it is one unique group identification GP_ of generation when described instant communication users group creates X, realizes the communication between security instant communication customer group, comprises the following steps;
Step 1, instant communication users group members download the corresponding private of mark from the key generation system of id password system Key;
Arbitrary IMU user X in step 2, instant communication users groupiObtain corresponding identity private keys GS_ of group identification GP_x x;
Step 3, in instant communication users group arbitrary IMU user need send instant messages when, all marked using group Know GP_x encryption session contents, send cipher-text message;
Step 4, private key GS_x decryption of other IMUs user using group identification GP_x in instant communication users group The cipher-text message for receiving.
Further, it is above-mentioned in the instant messaging encryption method of id password:In step 2, arbitrary IMU user XiObtaining corresponding identity private keys GS_x of group identification GP_x includes:
IMU user X in step 201, instant communication users groupiInitiate to obtain mark GP_x's to instant way system Request;
Step 202, instant way system judge IMU user XiWhether instant communication users group GP_x member is belonged to, if It is to turn to step 203, otherwise terminates;
Step 203, instant way system then generate identity private key GS_x and are sent to IMU user X by the passage of safetyi。 In the step 203, using user X in groupiMark ID_xiX is sent to after encryption group identification private key GS_xi, XiUsing which Group identification private key is obtained after identity private key decryption.
Further, it is above-mentioned in the instant messaging encryption method of id password:It is arbitrary in instant communication users group to be Shi Tongyong families XiIf after leaving group, instant communication users group identification is modified to GP'_x by instant way system, what notice was described is When communication user group in other IMUs user encrypted using new mark GP'_x in group communication, and secure distribution is new again Group private key GS'_x.
The present invention is described in more detail with specific embodiment below in conjunction with the accompanying drawings.
Description of the drawings
Fig. 1 is two IMU user's online negotiation cipher key processes.
When Fig. 2 is two IMU telex networks, secure communication process when one of them is not online.
Fig. 3 is group key distribution procedure in instant communication users group.
Fig. 4 is group encryption communication process in instant communication users group.
Specific embodiment
Embodiment 1, the present embodiment are a kind of methods that IMU user A and IMU user B carry out secure session.
The purpose of the present embodiment be for face during real-time multimedia communication identity forgery, leaking data, data Distort the security risk for facing, there is provided a kind of key agreement and data ciphering method of strong identity authentication.
The present embodiment is to illustrate two instant communication users A and B using the system such as QQ of instant messaging, wechat, SKYPE etc. Secrecy real-time session is carried out, it is known that the user conversated using such instant way system, needs to possess possess calculating The intelligent mobile terminal or PC terminals of ability, terminal install said system, instant communication users and IMU in explained below Letter client, the physical aspect of user can be regarded as one intelligent terminal of a personal use and another uses other one Intelligent terminal is communicated by the Internet, can not be limited as the locus of two people.In practice, instant messaging is used Made using general phone number during instant messaging or addresses of items of mail, No. QQ, the information with uniqueness such as micro-signal at family For identity, user carries out the authentication based on mark and key agreement mechanisms are first carried out during online instant messaging, association Business only has the key that both sides can just calculate, and coordinates data ciphering method to realize data exchange again using the key.
The method comprises the following steps realization:
It is step 1, corresponding in the communication process identity such as instant communication client loading mobile phone number or addresses of items of mail Identity private key.Instant communication client needs to download the corresponding private key of mark from the key generation system of id password system.This Process may relate to key generation system certification user and have the identity informations such as corresponding phone number or addresses of items of mail.Mark is close The key generation system of code system is a kind of " believable from trust authority (Self-Trust Authority, STA).
Situation 1, in the case where communicating pair A and B are online, as shown in Figure 1.
Step 2.1, user A (having identity ID_a) are input into the communications identities of user B using instant communication client Mark (the such as ID_b such as phone number or addresses of items of mail) initiates communication process;Instant communication client generates random X, according to system Selected parameter G, calculates R_a=GX;Being calculated using hash function H includes R_a, and ID_a, ID_b and some other correlations are believed The summary HASH_a of breath.Here parameter G can meet the generation unit in the elliptic curve point group of security requirement, or prime number Generation unit in the comultiplication group of domain.
The open systematic parameter of the id password system that step 2.2, A side's instant communication client inquiry ID_b marks are located PP_b;Mark AES encryption R_a and HASH_a is performed using PP_b and ID_b;By encrypted result, and optional ID_a, The information such as mark ID_kgc_a/ID_kgc_b of id password system that ID_b, ID_a/ID_b are located are sent to B side.
After step 2.3, B side's instant communication client receive the data of step 3, using the corresponding marks of ID_b using decryption Message obtains R_a, HASH_a;B verifies the legitimacy of HASH_a first;If illegal, terminate this communication, otherwise generate Random Y, according to parameter G that system is selected, calculates R_b=GY, K=(GX)Y=GXYOr K=R_a R_b;Using hash function H calculates the summary HASH_b for including R_a, R_b, ID_a, ID_b, K and some other relevant informations.
The open systematic parameter of the id password system that step 2.4, B side's instant communication client inquiry ID_a marks are located PP_a;Mark AES encryption R_b and HASH_b is performed using PP_a and ID_a;By encrypted result, and optional ID_a, The information such as mark ID_kgc_a/ID_kgc_b of id password system that ID_b, ID_a/ID_b are located are sent to A side.
After step 2.5, A side's instant communication client receive the message of step 5;Using the corresponding marks of ID_a using decryption Message obtains R_b, HASH_b;Calculate K=(GY)X=GXYOr K=R_a R_b;The legitimacy of verification HASH_b;If no It is legal, then terminate this communication.
Step 2.6, using K as key, using key derivation algorithm KDF (such as the KDF1 defined in ISO 18033-2 or Person KDF2) encryption key and message consistency protection key are derived from from K, using the symmetric encipherment algorithm and message concordance of selection Protection algorism, is encrypted to communication data and data consistency protection.Protected data can be word, voice, file Deng.
Situation 2, in the case where recipient B is not online, as shown in Figure 2.
3.1st, open systematic parameter PP_ of the id password system that A side's instant communication client inquiry ID_b marks are located b;Mark AES encryption instant message data are performed using PP_b and ID_b, data can be word, voice, file etc..
Situation 3, in the case of many people's group communications such as A, B, C:As shown in Figure 4.Here general saying is adopted, under Face group refers to instant communication users group, and user refers to IMU user.
4.1st, it is all living creatures during group creating into a unique group identification GP_x;
4.2nd, in group, user Z obtains corresponding identity private keys GS_x of mark GP_x;
4.2.1, Z-direction system initiates the request for obtaining mark GP_x
4.2.2, system judges whether Z belongs to crowd GP_x, and Z belongs to crowd GP_x, then generate identity private key GS_x
4.2.3, system is sent to user Z by the scheme of safety.For example using sending after the mark encryption GS_x of Z, Z makes Key is obtained with its private key decryption;The scheme of safety also have it is a lot, with regard to the present embodiment from the point of view of, due to the id password that we adopt It is mailbox number, telephone number etc., therefore, instant way system can also be by the way of mail or mobile phone short message to instant messaging Member in customer group sends identity private key GS_x.
4.3rd, U encrypts instant message using group identification GP_x;
4.4th, private key GS_x decrypting ciphertext message of the Z using group identification GP_x;
If after the 4.5, V leaves group, if it is desired, service system changes group identification to GP'_x, and notifying other use in group The encryption during group communication of family uses new mark GP'_x, and re-downloads new group private key GS'_x.As shown in Figure 3.
The beneficial effect of the present embodiment is that both sides have carried out strong identity authentication during two people's online communications, i.e., do not possess ID_a It is or the corresponding private keys of ID_b cannot effectively calculate communications protection key K, so as to be decrypted to the data encrypted or pseudo- Make or distort the message protected by data consistency.In offline communications or group communication, no corresponding identity private key without Method decrypts offline or group communication data.

Claims (10)

1. a kind of instant messaging encryption method based on id password, it is characterised in that:Instant communication users are from id password system The key generation system of system downloads the corresponding private key of mark, the instant communication users A with identity ID_a with there is identity The instant communication users B of mark ID_b realizes security instant communication, comprises the following steps;
Whether step A, instant communication users A detection instant communication users B are online, if turning to step B online, otherwise turning to step Rapid C;
Step B01, instant communication users A initiate communication process using the identity of instant communication users B;Use in instant messaging The terminal of family A generates random X, according to parameter G that system is selected, calculates R_a=GX;Being calculated using hash function H includes R_a, The summary HASH_a of the first information of ID_a, ID_b;
Open systematic parameter PP_b of the id password system that step B02, instant communication users A inquiry ID_b marks are located;Make Mark AES encryption R_a and HASH_a is performed with PP_b and ID_b;The second information data including encrypted result is sent To instant communication users B;
It is after step B03, instant communication users B receive the second information data of instant communication users A transmissions, corresponding using ID_b Private key decrypted message obtains R_a, HASH_a;
Step B04, instant communication users B verify the legitimacy of HASH_a;If illegal, terminate this communication, otherwise give birth to Into random number Y, according to parameter G that system is selected, R_b=G is calculatedY, K is calculated using R_a and R_b;Calculated using hash function H Including R_a, the summary HASH_b of the 3rd information of R_b, ID_a, ID_b, K;
Open systematic parameter PP_a of the id password system that step B05, instant communication users B inquiry ID_a marks are located;Make Mark AES encryption R_b and HASH_b is performed with PP_a and ID_a;The 4th information data including encrypted result is sent To instant communication users A;
After step B06, instant communication users A receive the 4th information data of instant communication users B transmissions;It is corresponding using ID_a Private key decrypted message obtains R_b, HASH_b;The legitimacy of verification HASH_b;If illegal, terminate this communication;Otherwise K is calculated using R_a and R_b;
Step B07, K is used when conversating as master key in instant communication users A and instant communication users B;Instant messaging User A and instant communication users B realize secured session, and session finishes end;
Open systematic parameter PP_b of the id password system that step C, instant communication users A inquiry ID_b marks are located;Use PP_b and ID_b performs mark AES encryption instant message data.
2. the instant messaging encryption method based on id password according to claim 1, it is characterised in that:In described step The formula that R_a and R_b calculates K is utilized to be K=(G in rapid B04X)Y=GXY;In described step B06, utilize R_a and R_b to count The formula for calculating K is K=(GY)X=GXY
3. the instant messaging encryption method based on id password according to claim 1, it is characterised in that:In described step The formula that R_a and R_b calculates K is utilized to be K=R_a R_b in rapid B04 and step B06.
4. the instant messaging encryption method based on id password according to claim 1 or 2 or 3, it is characterised in that:Second Information also includes ID_a, ID_b, mark ID_kgc_a/ID_kgc_b of the id password system that ID_a/ID_b is located.
5. the instant messaging encryption method based on id password according to claim 1 or 2 or 3, it is characterised in that:4th Information also includes ID_a, ID_b, mark ID_kgc_a/ID_kgc_b of the id password system that ID_a/ID_b is located.
6. the instant messaging encryption method based on id password according to claim 1 or 2 or 3, it is characterised in that:Step In B07, step C, the content of session includes word, voice, file.
7. the instant messaging encryption method based on id password according to claim 4, it is characterised in that:Described first Also include current time T in information, the second information, the 3rd information, the 4th information.
8. a kind of instant messaging encryption method based on id password, it is characterised in that:By one group of instant communication users [Xi] composition Instant communication users group, i is natural number, group members XiThere is identity ID_x respectivelyi, described instant communication users group To generate a unique group identification GP_x during establishment, the communication between security instant communication customer group, including following step are realized Suddenly;
Step 1, instant communication users group members download the corresponding private key of mark from the key generation system of id password system;
Arbitrary IMU user X in step 2, instant communication users groupiObtain corresponding identity private keys GS_x of group identification GP_x;
Step 3, in instant communication users group arbitrary IMU user need send instant messages when, all using group identification GP_x encrypts session content, sends cipher-text message;
Step 4, in instant communication users group other IMUs user using group identification GP_x private key GS_x decryption receive Cipher-text message.
9. the instant messaging encryption method in id password according to claim 8, it is characterised in that:It is in step 2, arbitrary IMU user XiObtaining corresponding identity private keys GS_x of group identification GP_x includes:
IMU user X in step 201, instant communication users groupiInitiate to obtain the request of mark GP_x to instant way system;
Step 202, instant way system judge IMU user XiWhether instant communication users group GP_x member is belonged to, if turning To step 203, otherwise terminate;
Step 203, instant way system then generate identity private key GS_x and are sent to IMU user X by the passage of safetyi
10. according to claim 8 the instant messaging encryption method based on id password, it is characterised in that:Instant messaging is used Arbitrary IMU user X in the group of familyiIf after leaving group, instant communication users group identification is modified to GP'_x by instant way system, In notifying described instant communication users group, other IMUs user is encrypted using new mark GP'_x in group communication, is laid equal stress on The new group private key GS'_x of new secure distribution.
CN201611123159.8A 2016-12-08 2016-12-08 Instant messaging encryption method based on identification password Active CN106549858B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611123159.8A CN106549858B (en) 2016-12-08 2016-12-08 Instant messaging encryption method based on identification password
CN201910342724.7A CN110071863A (en) 2016-12-08 2016-12-08 A kind of instant communication users group's encryption method based on id password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611123159.8A CN106549858B (en) 2016-12-08 2016-12-08 Instant messaging encryption method based on identification password

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201910342724.7A Division CN110071863A (en) 2016-12-08 2016-12-08 A kind of instant communication users group's encryption method based on id password

Publications (2)

Publication Number Publication Date
CN106549858A true CN106549858A (en) 2017-03-29
CN106549858B CN106549858B (en) 2019-12-10

Family

ID=58397073

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201910342724.7A Pending CN110071863A (en) 2016-12-08 2016-12-08 A kind of instant communication users group's encryption method based on id password
CN201611123159.8A Active CN106549858B (en) 2016-12-08 2016-12-08 Instant messaging encryption method based on identification password

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201910342724.7A Pending CN110071863A (en) 2016-12-08 2016-12-08 A kind of instant communication users group's encryption method based on id password

Country Status (1)

Country Link
CN (2) CN110071863A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106941406A (en) * 2017-05-02 2017-07-11 深圳奥联信息安全技术有限公司 Identify-based encryption endorsement method, decryption sign test method and its device
CN107135080A (en) * 2017-07-06 2017-09-05 深圳奥联信息安全技术有限公司 SM9 decryption methods and device
CN107893549A (en) * 2017-11-09 2018-04-10 曹睿康 A kind of building block
CN108964893A (en) * 2018-06-26 2018-12-07 百度在线网络技术(北京)有限公司 A kind of cipher key processing method, device, equipment and medium
CN114938358A (en) * 2022-04-14 2022-08-23 厦门市美亚柏科信息股份有限公司 Backup method and terminal for instant messaging application data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662458A (en) * 2008-08-28 2010-03-03 西门子(中国)有限公司 Authentication method
US20120311329A1 (en) * 2011-06-03 2012-12-06 Medina Alexander A System and method for secure instant messaging
CN105306492A (en) * 2015-11-25 2016-02-03 成都三零瑞通移动通信有限公司 Asynchronous key negotiation method and device aiming at secure instant messaging

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170404B (en) * 2006-10-24 2010-05-19 华为技术有限公司 Method for secret key configuration based on specified group
CN102196384B (en) * 2011-05-18 2014-08-13 陈善真 Automatic switching system and method based on cellular mobile communication network and Internet protocol (IP) network
CN105281897A (en) * 2014-07-22 2016-01-27 中兴通讯股份有限公司 File encryption method and device and file decryption method and device
CN104158653B (en) * 2014-08-14 2017-08-25 北京华电天益信息科技有限公司 A kind of safety communicating method based on the close algorithm of business
CN104219051B (en) * 2014-08-20 2018-04-13 北京奇艺世纪科技有限公司 The communication means and system of a kind of inner group message
US9712398B2 (en) * 2015-01-29 2017-07-18 Blackrock Financial Management, Inc. Authenticating connections and program identity in a messaging system
CN104618397B (en) * 2015-03-04 2018-12-28 北京深思数盾科技股份有限公司 A kind of encryption method and encryption system for instant message applications
CN105025019B (en) * 2015-07-07 2018-09-28 深圳奥联信息安全技术有限公司 A kind of data safety sharing method
CN105610789B (en) * 2015-12-18 2019-04-30 成都三零瑞通移动通信有限公司 A kind of data ciphering method for chatting instant messaging suitable for more crowds

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662458A (en) * 2008-08-28 2010-03-03 西门子(中国)有限公司 Authentication method
US20120311329A1 (en) * 2011-06-03 2012-12-06 Medina Alexander A System and method for secure instant messaging
CN105306492A (en) * 2015-11-25 2016-02-03 成都三零瑞通移动通信有限公司 Asynchronous key negotiation method and device aiming at secure instant messaging

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106941406A (en) * 2017-05-02 2017-07-11 深圳奥联信息安全技术有限公司 Identify-based encryption endorsement method, decryption sign test method and its device
CN106941406B (en) * 2017-05-02 2019-11-08 深圳奥联信息安全技术有限公司 Identify-based encryption endorsement method, decryption sign test method and device thereof
CN107135080A (en) * 2017-07-06 2017-09-05 深圳奥联信息安全技术有限公司 SM9 decryption methods and device
CN107135080B (en) * 2017-07-06 2019-09-27 深圳奥联信息安全技术有限公司 SM9 decryption method and device
CN107893549A (en) * 2017-11-09 2018-04-10 曹睿康 A kind of building block
CN108964893A (en) * 2018-06-26 2018-12-07 百度在线网络技术(北京)有限公司 A kind of cipher key processing method, device, equipment and medium
CN108964893B (en) * 2018-06-26 2021-11-23 百度在线网络技术(北京)有限公司 Key processing method, device, equipment and medium
CN114938358A (en) * 2022-04-14 2022-08-23 厦门市美亚柏科信息股份有限公司 Backup method and terminal for instant messaging application data
CN114938358B (en) * 2022-04-14 2024-02-23 厦门市美亚柏科信息股份有限公司 Backup method and terminal for instant messaging application data

Also Published As

Publication number Publication date
CN110071863A (en) 2019-07-30
CN106549858B (en) 2019-12-10

Similar Documents

Publication Publication Date Title
CN107888560B (en) Mail safe transmission system and method for mobile intelligent terminal
US8499156B2 (en) Method for implementing encryption and transmission of information and system thereof
CN105323070B (en) A kind of safety E-mail implementation method based on digital envelope
CN110535868A (en) Data transmission method and system based on Hybrid Encryption algorithm
CN108090370B (en) Instant communication encryption method and system based on index
CN101626294A (en) Certifying method based on identity, method, equipment and system for secure communication
CN106549858A (en) A kind of instant messaging encryption method based on id password
EP0755598A1 (en) Computer network cryptographic key distribution system
JPH06350598A (en) Mutual verification/ciphering key delivery system
US9130744B1 (en) Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary
CN111277412B (en) Data security sharing system and method based on block chain key distribution
CN108011885B (en) E-mail encryption method and system based on group cryptosystem
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN102547688A (en) Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel
CN110120939A (en) A kind of encryption method and system of the deniable authentication based on heterogeneous system
CN105743641B (en) It is a kind of can explicit authentication public key multi-receiver label decryption method
CN109873699A (en) A kind of voidable identity public key encryption method
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN108833373A (en) The instant messaging and anonymous access method of facing relation secret protection social networks
US11722466B2 (en) Methods for communicating data utilizing sessionless dynamic encryption
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN107483429A (en) A kind of data ciphering method and device
CN112738133A (en) RSA authentication method
US7360238B2 (en) Method and system for authentication of a user
CN106788997B (en) A kind of real-time multimedia encryption method based on id password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant